Network security through data analysis from data to action

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Collins, Michael (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, CA O'Reilly Media 2017
Ausgabe:Second edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047618051
003 DE-627-1
005 20240228120333.0
007 cr uuu---uuuuu
008 191023s2017 xx |||||o 00| ||eng c
020 |a 9781491962817  |9 978-1-4919-6281-7 
020 |a 149196281X  |9 1-4919-6281-X 
020 |a 9781491962794  |9 978-1-4919-6279-4 
020 |a 1491962798  |9 1-4919-6279-8 
020 |a 1491962836  |9 1-4919-6283-6 
020 |a 9781491962831  |9 978-1-4919-6283-1 
035 |a (DE-627-1)047618051 
035 |a (DE-599)KEP047618051 
035 |a (ORHE)9781491962831 
035 |a (DE-627-1)047618051 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Collins, Michael  |e VerfasserIn  |4 aut 
245 1 0 |a Network security through data analysis  |b from data to action  |c Michael Collins 
250 |a Second edition. 
264 1 |a Sebastopol, CA  |b O'Reilly Media  |c 2017 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Previous edition published: 2014. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 18, 2017) 
520 |a Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques. 
650 0 |a Computer networks  |x Security measures 
650 0 |a Communication  |x Network analysis 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Communication ; Analyse de réseau 
650 4 |a COMPUTERS ; Security ; Networking 
650 4 |a Communication ; Network analysis 
650 4 |a Computer networks ; Security measures 
776 1 |z 1491962844 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1491962844 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781491962831/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047618051
_version_ 1818767306527866880
adam_text
any_adam_object
author Collins, Michael
author_facet Collins, Michael
author_role aut
author_sort Collins, Michael
author_variant m c mc
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047618051
(DE-599)KEP047618051
(ORHE)9781491962831
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition Second edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03353cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047618051</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120333.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491962817</subfield><subfield code="9">978-1-4919-6281-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">149196281X</subfield><subfield code="9">1-4919-6281-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491962794</subfield><subfield code="9">978-1-4919-6279-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491962798</subfield><subfield code="9">1-4919-6279-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491962836</subfield><subfield code="9">1-4919-6283-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491962831</subfield><subfield code="9">978-1-4919-6283-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047618051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047618051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781491962831</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047618051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collins, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security through data analysis</subfield><subfield code="b">from data to action</subfield><subfield code="c">Michael Collins</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2014. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 18, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Communication</subfield><subfield code="x">Network analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication ; Analyse de réseau</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication ; Network analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1491962844</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1491962844</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781491962831/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047618051
illustrated Illustrated
indexdate 2024-12-18T08:47:47Z
institution BVB
isbn 9781491962817
149196281X
9781491962794
1491962798
1491962836
9781491962831
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher O'Reilly Media
record_format marc
spelling Collins, Michael VerfasserIn aut
Network security through data analysis from data to action Michael Collins
Second edition.
Sebastopol, CA O'Reilly Media 2017
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Previous edition published: 2014. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 18, 2017)
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.
Computer networks Security measures
Communication Network analysis
Réseaux d'ordinateurs ; Sécurité ; Mesures
Communication ; Analyse de réseau
COMPUTERS ; Security ; Networking
Communication ; Network analysis
Computer networks ; Security measures
1491962844
Erscheint auch als Druck-Ausgabe 1491962844
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781491962831/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Collins, Michael
Network security through data analysis from data to action
Computer networks Security measures
Communication Network analysis
Réseaux d'ordinateurs ; Sécurité ; Mesures
Communication ; Analyse de réseau
COMPUTERS ; Security ; Networking
Communication ; Network analysis
Computer networks ; Security measures
title Network security through data analysis from data to action
title_auth Network security through data analysis from data to action
title_exact_search Network security through data analysis from data to action
title_full Network security through data analysis from data to action Michael Collins
title_fullStr Network security through data analysis from data to action Michael Collins
title_full_unstemmed Network security through data analysis from data to action Michael Collins
title_short Network security through data analysis
title_sort network security through data analysis from data to action
title_sub from data to action
topic Computer networks Security measures
Communication Network analysis
Réseaux d'ordinateurs ; Sécurité ; Mesures
Communication ; Analyse de réseau
COMPUTERS ; Security ; Networking
Communication ; Network analysis
Computer networks ; Security measures
topic_facet Computer networks Security measures
Communication Network analysis
Réseaux d'ordinateurs ; Sécurité ; Mesures
Communication ; Analyse de réseau
COMPUTERS ; Security ; Networking
Communication ; Network analysis
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781491962831/?ar
work_keys_str_mv AT collinsmichael networksecuritythroughdataanalysisfromdatatoaction